Deleted Added
full compact
au_control.3 (155364) au_control.3 (162503)
1.\"-
2.\" Copyright (c) 2005 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 9 unchanged lines hidden (view full) ---

18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
1.\"-
2.\" Copyright (c) 2005 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 9 unchanged lines hidden (view full) ---

18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
26.\" $P4: //depot/projects/trustedbsd/openbsm/libbsm/au_control.3#3 $
26.\" $P4: //depot/projects/trustedbsd/openbsm/libbsm/au_control.3#4 $
27.\"
28.Dd April 19, 2005
29.Dt AU_CONTROL 3
30.Os
31.Sh NAME
32.Nm setac ,
33.Nm endac ,
34.Nm getacdir ,
35.Nm getacmin ,
36.Nm getacflg ,
27.\"
28.Dd April 19, 2005
29.Dt AU_CONTROL 3
30.Os
31.Sh NAME
32.Nm setac ,
33.Nm endac ,
34.Nm getacdir ,
35.Nm getacmin ,
36.Nm getacflg ,
37.Nm getacna
37.Nm getacna ,
38.Nm getacpol ,
39.Nm au_poltostr
40.Nm au_strtopol
38.Nd "Look up information from the audit_control database"
39.Sh LIBRARY
40.Lb libbsm
41.Sh SYNOPSIS
42.In libbsm.h
43.Ft void
44.Fn setac "void"
45.Ft void
46.Fn endac "void"
47.Ft int
48.Fn getacdir "char *name" "int len"
49.Ft int
50.Fn getacmin "int *min_val"
51.Ft int
52.Fn getacflg "char *auditstr" "int len"
53.Ft int
54.Fn getacna "char *auditstr" "int len"
41.Nd "Look up information from the audit_control database"
42.Sh LIBRARY
43.Lb libbsm
44.Sh SYNOPSIS
45.In libbsm.h
46.Ft void
47.Fn setac "void"
48.Ft void
49.Fn endac "void"
50.Ft int
51.Fn getacdir "char *name" "int len"
52.Ft int
53.Fn getacmin "int *min_val"
54.Ft int
55.Fn getacflg "char *auditstr" "int len"
56.Ft int
57.Fn getacna "char *auditstr" "int len"
58.Ft int
59.Fn getacpol "char *auditstr" "size_t len"
60.Ft ssize_t
61.Fn au_poltostr "long policy" "size_t maxsize" "char *buf"
62.Ft int
63.Fn au_strtopol "const char *polstr" "long *policy"
55.Sh DESCRIPTION
56These interfaces may be used to look up information from the
57.Xr audit_control 5
58database, which contains various audit-related administrative parameters.
59.Pp
60.Fn setac
61resets the database iterator to the beginning of the database; see the
62BUGS section for more information.

--- 22 unchanged lines hidden (view full) ---

85of length
86.Va len .
87.Pp
88.Fn getacna
89returns the non-attributable flags via the passed character buffer
90.Va auditstr
91of length
92.Va len .
64.Sh DESCRIPTION
65These interfaces may be used to look up information from the
66.Xr audit_control 5
67database, which contains various audit-related administrative parameters.
68.Pp
69.Fn setac
70resets the database iterator to the beginning of the database; see the
71BUGS section for more information.

--- 22 unchanged lines hidden (view full) ---

94of length
95.Va len .
96.Pp
97.Fn getacna
98returns the non-attributable flags via the passed character buffer
99.Va auditstr
100of length
101.Va len .
102.Pp
103.Fn getacpol
104returns the audit policy flags via the passed character buffer
105.Va auditstr
106of length
107.Va len .
108.Pp
109.Fn au_poltostr
110converts a numeric audit policy mask,
111.Va policy ,
112value to a string in the passed character buffer
113.Va buf
114of lenth
115.Va maxsize .
116.Pp
117.Fn au_strtopol
118converts an audit policy flags string,
119.Va polstr ,
120to a numeric audit policy mask returned via
121.Va policy .
93.Sh RETURN VALULES
94.Fn getacdir ,
95.Fn getacmin ,
96.Fn getacflg ,
122.Sh RETURN VALULES
123.Fn getacdir ,
124.Fn getacmin ,
125.Fn getacflg ,
126.Fn getacna ,
127.Fn getacpol ,
97and
128and
98.Fn getacna
129.Fn au_strtopol
99return 0 on success, or a negative value on failure, along with error
100information in
101.Va errno .
130return 0 on success, or a negative value on failure, along with error
131information in
132.Va errno .
133.Pp
134.Fn au_poltostr
135returns a string length of 0 or more on success, or a negative value on
136if there is a failure.
137.Pp
102Functions that return a string value will return a failure if there is
103insufficient room in the passed character buffer for the full string.
104.Sh SEE ALSO
105.Xr libbsm 3 ,
106.Xr audit_control 5
107.Sh AUTHORS
108This software was created by Robert Watson, Wayne Salamon, and Suresh
109Krishnaswamy for McAfee Research, the security research division of McAfee,

--- 27 unchanged lines hidden ---
138Functions that return a string value will return a failure if there is
139insufficient room in the passed character buffer for the full string.
140.Sh SEE ALSO
141.Xr libbsm 3 ,
142.Xr audit_control 5
143.Sh AUTHORS
144This software was created by Robert Watson, Wayne Salamon, and Suresh
145Krishnaswamy for McAfee Research, the security research division of McAfee,

--- 27 unchanged lines hidden ---